Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23)
  • Open Access

    ARTICLE

    Applying Probabilistic Model Checking to Path Planning in an Intelligent Transportation System Using Mobility Trajectories and Their Statistical Data

    Honghao Gao1, 2, 5, Wanqiu Huang1, 4, Xiaoxian Yang3

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 547-559, 2019, DOI:10.31209/2019.100000110

    Abstract Path planning is an important topic of research in modern intelligent traffic systems (ITSs). Traditional path planning methods aim to identify the shortest path and recommend this path to the user. However, the shortest path is not always optimal, especially in emergency rescue scenarios. Thus, complex and changeable factors, such as traffic congestion, road construction and traffic accidents, should be considered when planning paths. To address this consideration, the maximum passing probability of a road is considered the optimal condition for path recommendation. In this paper, the traffic network is abstracted as a directed graph. Probabilistic data on traffic flow… More >

  • Open Access

    ARTICLE

    Authentication of Vehicles and Road Side Units in Intelligent Transportation System

    Muhammad Waqas1, 2, Shanshan Tu1, 3, *, Sadaqat Ur Rehman1, Zahid Halim2, Sajid Anwar2, Ghulam Abbas2, Ziaul Haq Abbas4, Obaid Ur Rehman5

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 359-371, 2020, DOI:10.32604/cmc.2020.09821

    Abstract Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents, economically damaging traffic jams, hijacking, motivating to wrong routes, and financial losses for businesses and governments. Smart and autonomous vehicles are connected wirelessly, which are more attracted for attackers due to the open nature of wireless communication. One of the problems is the rogue attack, in which the attacker pretends to be a legitimate user or access point by utilizing fake identity. To figure out the problem of a rogue attack, we propose a reinforcement learning algorithm to identify rogue nodes by exploiting the channel state… More >

  • Open Access

    ARTICLE

    Numerical Simulation and Natural Computing applied to a Real World Traffic Optimization Case under Stress Conditions:

    M.J. Galán Moreno, J.J. Sánchez Medina, L. Álvarez Álvarez E. Rubio Royo1

    CMES-Computer Modeling in Engineering & Sciences, Vol.50, No.3, pp. 191-226, 2009, DOI:10.3970/cmes.2009.050.191

    Abstract Urban traffic is a key factor for the development of a city. There exist many different approaches facing traffic optimization. In our case we have focused on traffic lights optimization. We have designed and tested a new architecture to optimize traffic light cycle times. The purpose of this research is to demonstrate the good performance of our architecture in a congested scenario. We have simulated several congestion situations for a very large real world traffic network - "La Almozara" in Zaragoza, Spain. Our results seem encouraging in this extreme situation. As we increase the load in the network we get… More >

Displaying 21-30 on page 3 of 23. Per Page